General
-
Target
b2e4ade36630708f86783ebbba13165d.bin
-
Size
4.2MB
-
Sample
250507-b1n2ssek3t
-
MD5
3d36c6d475a683a7de520f00143d37bb
-
SHA1
08cebea96339b50f7cdb2c22972bf1cc1a9c0513
-
SHA256
bb66e92ff2c1c660f6c2e50063d4566285dd6ffe5ff184d910cb8f266241dfba
-
SHA512
0f343fb7061455d8b5138920a80726ee06f21870440241712bfae62985c3121b2db0aade94de6bfb244e15df1d7051dfbc360ab4268f958b26158ad48d43fe2d
-
SSDEEP
98304:CMZhXfG/yVEf8L4gTaGgjFitroLaG8+MngMSTq6Xfp7:CiXuqVEf8UgTpgjld8zgtV
Static task
static1
Behavioral task
behavioral1
Sample
fad90b975af603df711f6533415835b1362b476c1f214530d620aace0532c36c.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
gcleaner
45.91.200.135
Targets
-
-
Target
fad90b975af603df711f6533415835b1362b476c1f214530d620aace0532c36c.exe
-
Size
4.2MB
-
MD5
b2e4ade36630708f86783ebbba13165d
-
SHA1
4c502786fa2e8d7761ce200141a882740a2de9b6
-
SHA256
fad90b975af603df711f6533415835b1362b476c1f214530d620aace0532c36c
-
SHA512
9ff6c0932d8088800cdce11bd40dd96660b26ebec84e76f61140391b1f0e015c76aedd9c3cb2d511d2f7ac08bc2ce2a923898f082ad90615715446b3af769821
-
SSDEEP
98304:Gl7uFNSdIBKg2QbaM+82ExdPpQtOd8NkToTfZhuqPo6g4:AuNdMg2QeMGq5AOukIfFPo
Score10/10-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-